搜索结果: 1-11 共查到“军队指挥学 Certificateless signature”相关记录11条 . 查询时间(0.156 秒)
Insecurity of a provably secure and lightweight certificateless signature scheme for IIoT environments
Certificateless cryptography Signature Bilinear pairing
2018/11/20
Recently, Karati et al. presented a lightweight certificateless signature scheme for industrial Internet of Things (IIoT) environments, and claimed the scheme was provably secure in the standard model...
Cryptanalysis of Wang et al’s Certificateless Signature Scheme without Bilinear Pairings
cryptographic protocols CLS
2017/3/6
In these years, the design of certificateless signature (CLS) scheme without bilinear pairings has been thoroughly investigated owing to its effectiveness on solving the key escrow problem in identity...
A Revocable Online-Offline Certificateless Signature Scheme without Pairing
Tight security Random oracle
2014/3/6
Certificateless Public key Cryptography is a widely studied paradigm due to its advantages of not having the key-escrow problem and the lack of use of certificates. Online-Offline signature schemes ar...
Certificateless public key cryptography is an attractive paradigm since it eliminates the use of certificates in traditional public key cryptography and alleviates the inherent key escrow problem in i...
A revocable certificateless signature scheme
public-key cryptography revocation certificateless signature
2013/2/21
Certificateless public key cryptography (CLPKC), with properties of no key escrow and no certificate, has received a lot of attention since its invention. However, membership revocation in certificate...
On the security models for certificateless signature schemes achieving level 3 security
public-key cryptography /certificateless public key cryptography certificateless signature Gi-rault's trust level level 3 security
2012/3/23
key cryptography has found many applications in our modern society. To guarantee the authenticity of public keys, we need a trusted third party (TTP). In 1991, Girault defined three trust levels for a...
Efficient and provably-secure certificateless signature scheme without bilinear pairings
Certificateless public key cryptography Certificateless signature Bilinear pairings
2010/12/14
Many certificateless signature schemes using bilinear pairings have been proposed. But the relative computation cost of the pairing is approximately twenty times higher than that of the scalar multipl...
Key Replacement Attack on a Certificateless Signature Scheme
Certificateless signature key replacement attack bilinear pairing
2009/1/6
Yap, Heng and Goi propose an efficient certificateless signature
scheme based on the intractability of the computational Diffie-
Hellman problem, and prove that the scheme is secure in the random or...
An attack on the certificateless signature scheme from EUC Workshops 2006
Signature scheme Certificateless PKC Public Key Cryptography
2009/1/5
In this letter, we will show that the certificateless signature scheme recently proposed by Yap, Heng and Goi at EUC Workshops 2006 is insecure against a key replacement
attack. Our attack shows that...
Self-Generated-Certificate Public Key Cryptography and Certificateless Signature / Encryption Scheme in the Standard Model
Self-Generated-Certificate Public Key Cryptography Certificateless Signature Encryption Scheme Standard Model
2008/12/25
Certificateless Public Key Cryptography (CL-PKC) enjoys a number of features of
Identity-Based Cryptography (IBC) while without having the problem of key escrow. However,
it does suffer to an attack...
An Attack on a Certificateless Signature Scheme
Certificateless public key signature replacement attack forgery
2008/12/24
This paper demonstrates that a certificateless signature scheme
recently proposed by Gorantla and Saxena is insecure. It is shown that
an adversary who replaces the public key of a signer can then f...